what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 126 - 150 of 297 RSS Feed

Registry Files

Registry Decoder Digital Forensics Tool
Posted Sep 8, 2011
Authored by Mohit Kumar | Site thehackernews.com

Digital forensics deals with the analysis of artifacts on all types of digital devices. One of the most prevalent analysis techniques performed is that of the registry hives contained in Microsoft Windows operating systems. Registry Decoder was developed with the purpose of providing a single tool for the acquisition, analysis, and reporting of registry contents.

tags | registry
systems | windows
SHA-256 | 0bf122d130ac2701097efb0279ea1770e47de47890bfe248c6efa066170e445e
Secunia Security Advisory 45686
Posted Aug 23, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM WebSphere Service Registry and Repository, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory, registry
SHA-256 | ce1550069596eaa7ff73bcee52dfee54874c8c09112cfbfd63df226fca87dc48
Iconics GENESIS32 Integer Overflow
Posted Jul 19, 2011
Authored by Luigi Auriemma, corelanc0d3r, Lincoln | Site metasploit.com

Iconics GENESIS32 version 9.21.201.01 suffers from an integer overflow vulnerability. The GenBroker service on port 38080 is affected by three integer overflow vulnerabilities while handling opcode 0x4b0, which is caused by abusing the the memory allocations needed for the number of elements passed by the client. This results unexpected behaviors such as direct registry calls, memory location calls, or arbitrary remote code execution. Please note that in order to ensure reliability, this exploit will try to open calc (hidden), inject itself into the process, and then open up a shell session. Also, DEP bypass is supported.

tags | exploit, remote, overflow, arbitrary, shell, registry, vulnerability, code execution
SHA-256 | 7bae29e02d02057cc61741efd202ae99da696fffbf3d953322faa7fcd5294a22
Java RMI Server Insecure Default Configuration Java Code Execution
Posted Jul 16, 2011
Authored by Michael Schierl | Site metasploit.com

This Metasploit module takes advantage of the default configuration of the RMI Registry and RMI Activation services, which allow loading classes from any remote (HTTP) URL. As it invokes a method in the RMI Distributed Garbage Collector which is available via every RMI endpoint, it can be used against both rmiregistry and rmid, and against most other (custom) RMI endpoints as well. Note that it does not work against Java Management Extension (JMX) ports since those do not support remote class loading, unless another RMI endpoint is active in the same Java process. RMI method calls do not support or require any sort of authentication.

tags | exploit, java, remote, web, registry
SHA-256 | 74cc3c759347106de31d2f7d447682b88481649a9cdcb47556ef3dc90a7223ae
Dell IT Assistant detectIESettingsForITA.ocx Remote Registry Dump
Posted Jul 16, 2011
Authored by rgod | Site retrogod.altervista.org

Dell IT Assistant detectIESettingsForITA.ocx Active-X control readRegVal() remote registry dump exploit.

tags | exploit, remote, registry, activex
SHA-256 | 972fe47b27217c4fe43b9ab5056484e368ca06d298659a3290fa514440134e4e
GrokEVT Scripts 0.5.0
Posted Jun 20, 2011
Authored by Tim Morgan | Site sentinelchicken.org

GrokEVT is a collection of scripts for reading Windows event log files on Unix. The scripts work together on one or more mounted Windows partitions to extract all information needed (registry entries, message templates, and log files) to convert the logs to a human-readable format.

Changes: This is a major code refresh release to catch up with the times. grokevt-builddb has been redesigned to use RegLookup's pyregfi library instead of executing the command line tools. A work-around has been added for the fact that many Linux distributions no longer make case-insensitive filesystem mounts easy. Support jas been added for Python 3. The license has been changed to the GPLv3. There are various Unicode fixes and other bugfixes.
tags | registry
systems | windows, unix
SHA-256 | a9e74aee34e5e451e2940487fc84fcd51ac0c986e96b1681ec9218bf74a94829
RegLookup Registry Parser 1.0.0
Posted Jun 20, 2011
Authored by Timothy D. Morgan | Site projects.sentinelchicken.org

RegLookup is a small command line utility for parsing and searching registry files from Windows NT and later.

Changes: SK records and security descriptors are now accessible in pyregfi. Key caching was added to regfi, and SK caching was reintroduced. Minor API simplifications were made and documentation was improved. Numerous bugs were fixed.
tags | registry
systems | windows, unix
SHA-256 | c9123786bc1be1a714c59e2fabae693d434698ce4d3fc44847cb847bff26b686
RegLookup Registry Parser 0.99.0
Posted May 2, 2011
Authored by Timothy D. Morgan | Site projects.sentinelchicken.org

RegLookup is a small command line utility for parsing and searching registry files from Windows NT and later.

Changes: This 1.0 release candidate contains major improvements to regfi usability. regfi was made a proper library, and major improvements were made to the API. Python bindings (pyregfi) were added for regfi. The Make-based build system was replaced with a SCons-based one. Numerous improvements were made in regfi for multithreaded use and memory management. API documentation was improved.
tags | registry
systems | windows, unix
SHA-256 | b7ae9e5c13f949ef958da4cba741067516bbc4c2800e033ff0d6ad4506945406
Registry String Wiper
Posted Apr 10, 2011
Authored by Paolo Iorio | Site paoloiorio.it

This windows binary is a lightweight tool for removing strings in the Windows registry.

tags | registry
systems | windows
SHA-256 | 930084f1b07b611ad257a6cfe7c757a97c1013ed722666b27d57b5aa114e5604
Secunia Security Advisory 42742
Posted Dec 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM WebSphere Service Registry and Repository, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory, registry
SHA-256 | f4c441bb1c2dd6767bc1e9625817395024182d88e4388acde8d4ddfa3d04c4c0
SmartFTP / Speak Aloud / The GodFather / Vip Rumor Player / Wise Registry Cleaner DLL Hijacking
Posted Oct 27, 2010
Authored by anT!-Tr0J4n

SmartFTP version 4.0.1142.0, Speak Aloud, The GodFather version 0.80, Vip Rumor Player version 3.7 and Wise Registry Cleaner DLL hijacking exploit.

tags | exploit, registry
SHA-256 | 0a8c2d9a9b6b25e76828d4528d063bf6d6e6d75f8d9314b1a6682e9bf35411b7
Zero Day Initiative Advisory 10-145
Posted Aug 12, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-145 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell ZENWorks Remote Management. Access to a single node with Remote Management client installed and configured is required. The specific flaw exists within the storage of Remote Management authentication information on the client. The client utilizes a password stored in the registry that is common among all nodes. This can be exploited by an attacker to execute remote code on any target with the client installed.

tags | advisory, remote, arbitrary, registry
SHA-256 | 8ca0a2ed35cf8c12d8928288cf8e2cccd425210d6feb2ab5d311442100603476
Secunia Security Advisory 40862
Posted Aug 7, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in IBM WebSphere Service Registry and Repository, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, registry, vulnerability, xss
SHA-256 | 79cf987873529f97ed8f7b4230964a59228d028873e9e1491052426c3d94a910
HP Security Bulletin HPSBMA02490 SSRT090222
Posted Mar 31, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - Potential security vulnerabilities have been identified with HP SOA Registry Foundation. The vulnerabilities could be exploited remotely to gain unauthorized access to data, for cross site scripting (XSS), or to escalate privileges.

tags | advisory, registry, vulnerability, xss
advisories | CVE-2010-0448, CVE-2010-0449, CVE-2010-0450
SHA-256 | bbda352244788e6afcab64cbca7d44c84fac053e9dc79db7d466c06de38d3c1e
Secunia Security Advisory 39187
Posted Mar 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in HP SOA Registry Foundation, which can be exploited by malicious users to gain escalated privileges and by malicious people to conduct cross-site scripting attacks and bypass certain security restrictions.

tags | advisory, registry, vulnerability, xss
SHA-256 | 1612622b14a877fed699f4406f0eefb5e0ea84611779fe95a94b3aa2afd705d4
RegLookup Register Parser 0.12.0
Posted Mar 9, 2010
Authored by Timothy D. Morgan | Site projects.sentinelchicken.org

RegLookup is a small command line utility for parsing and searching registry files from Windows NT and later.

Changes: Big data support was improved and added to reglookup-recover. A -i option was added to reglookup for assisting with timeline generation. Unicode support was improved by correctly interpreting UTF-16LE key and value names. Data type interpretation was moved into regfi, and the regfi library interface was reorganized. regfi documentation was improved and Doxygen formatting was added.
tags | registry
systems | windows
SHA-256 | 2efcef5aae5418aac5d3ebe7af46e05349622d4e16ab73186e38b6c28762a94e
Terminal Server License Bypass
Posted Jan 11, 2010
Authored by Zorzan Urban Pawel | Site pawelzorzan.eu

This registry code allows any terminal client access to a Terminal Server. It bypasses the Microsoft "Terminal Server License" and allows the client to create a session on the server without a CAL (Client Access License) or MS Open License. It works on WinNT, Win2000, Win2003 server and Win2008 server.

tags | registry, bypass
systems | windows
SHA-256 | 9cec54ca3bf48377115aba5d8a681eeb8b070d26a3b7949518b42ec39e09b6cb
Microsoft RRAS Service RASMAN Registry Overflow
Posted Nov 26, 2009
Authored by H D Moore, Pusscat | Site metasploit.com

This Metasploit module exploits a registry-based stack overflow in the Windows Routing and Remote Access Service. Since the service is hosted inside svchost.exe, a failed exploit attempt can cause other system services to fail as well. A valid username and password is required to exploit this flaw on Windows 2000. When attacking XP SP1, the SMBPIPE option needs to be set to 'SRVSVC'. Exploiting this flaw involves two distinct steps - creating the registry key and then triggering an overwrite based on a read of this key. Once the key is created, it cannot be recreated. This means that for any given system, you only get one chance to exploit this flaw. Picking the wrong target will require a manual removal of the following registry key before you can try again: HKEY_USERS\\\\.DEFAULT\\\\Software\\\\Microsoft\\\\RAS Phonebook

tags | exploit, remote, overflow, registry
systems | windows
advisories | CVE-2006-2370
SHA-256 | 23ee569235c3874d89c2c84da0e57b5ca0d9fd9d118297399485cee1eebf336b
Mandriva Linux Security Advisory 2009-042
Posted Feb 18, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-042 - Samba 3.2.0 through 3.2.6, when registry shares are enabled, allows remote authenticated users to access the root filesystem via a crafted connection request that specifies a blank share name. This update provides samba 3.2.7 to address this issue.

tags | advisory, remote, root, registry
systems | linux, mandriva
advisories | CVE-2009-0022
SHA-256 | efb5f8b23c9eedd417563c173288af30bba7270229333d7b3a27d00d1092a230
Ubuntu Security Notice 702-1
Posted Jan 6, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-702-1 - Gunter Hockel discovered that Samba with registry shares enabled did not properly validate share names. An authenticated user could gain access to the root filesystem by using an older version of smbclient and specifying an empty string as a share name. This is only an issue if registry shares are enabled on the server by setting "registry shares = yes", "include = registry", or "config backend = registry", which is not the default.

tags | advisory, root, registry
systems | linux, ubuntu
advisories | CVE-2009-0022
SHA-256 | 1f54398ec952d4b39f2110cd81591e592bacac95220038e4c096a6ab8d8ae1ba
hummingbird-registry.txt
Posted Oct 17, 2008
Authored by shinnai | Site shinnai.altervista.org

Hummingbird Deployment Wizard 2008 with DeployRun.dll versions 10.0.0.44 and below suffer from a registry value creation/change vulnerability.

tags | exploit, registry
SHA-256 | 64592e90a4355f468b611c04f4d156ae3760bf75c7dc2e15f12730716ebb6192
grokevt-0.4.1.tar.gz
Posted Mar 21, 2008
Authored by Tim Morgan | Site sentinelchicken.org

GrokEVT is a collection of scripts for reading Windows event log files on Unix. The scripts work together on one or more mounted Windows partitions to extract all information needed (registry entries, message templates, and log files) to convert the logs to a human-readable format.

tags | registry
systems | windows, unix
SHA-256 | 01a6114fa008aabd4c84b5eb4af2b43ecb2816c9a7e5408de54d5507d0bf83ab
registrypro-insecure.txt
Posted Mar 19, 2008
Authored by t0pp8uzz

Registry Pro remote insecure method exploit that makes use of epRegPro.ocx.

tags | exploit, remote, registry
SHA-256 | 7df90c5d8e874b8e50220298a3d3d4af0261dd70bd90d1efa150baef96a938bd
taskmgr_dos.c.txt
Posted Mar 14, 2008
Authored by SkyOut | Site core-security.net

Exploit that demonstrates how the manipulation of a registry key in Microsoft Windows XP SP2 can disable the taskmanager.

tags | exploit, registry
systems | windows
SHA-256 | 72924758a2cd7b2bee11688185242cfe21c6a2f799feebfdf44715eaa66f897b
creddump-0.1.tar.bz2
Posted Feb 22, 2008
Authored by Brendan Dolan-Gavitt | Site code.google.com

creddump is a python tool to extract various credentials and secrets from Windows registry hives. It currently extracts LM and NT hashes (SYSKEY protected), cached domain passwords, and LSA secrets. It essentially performs all the functions that bkhive/samdump2, cachedump, and lsadump2 do, but in a platform-independent way.

tags | cracker, registry, python
systems | windows
SHA-256 | 374120593faeda9eec711d4116574781a467e1b5a0057fa090a5b58d4a9c029e
Page 6 of 12
Back45678Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close